1
0
mirror of https://github.com/nmap/nmap.git synced 2025-12-09 14:11:29 +00:00

Add dns-brute.nse.

This commit is contained in:
david
2011-03-05 21:15:58 +00:00
parent 987d5f19a4
commit 3fe40dd995
2 changed files with 460 additions and 0 deletions

459
scripts/dns-brute.nse Normal file
View File

@@ -0,0 +1,459 @@
description = [[
Attempts to find an DNS hostnames by brute force guessing.
]]
-- 2011-01-26
---
-- @usage
-- nmap --script dns-brute --script-args dns-brute.domain=foo.com,dns-brute.threads=6,dns-brute.cclass,dns-brute.hostlist=./hostfile.txt,newtargets -sS -p 80
-- nmap --script dns-brute www.foo.com
-- nmap -6 --script dns-brute --script-args dns-brute.cclass,dns-brute.domain=foo.com,dns-brute.ipv6=only,newtargets -v -p 80
-- @args dns-brute.hostlist The filename of a list of host strings to try.
-- @args dns-brute.threads Thread to use (default 5).
-- @args dns-brute.cclass If specified, adds the reverse DNS for the c-class of all discovered IP addresses. cclass can
-- also be set to the value 'printall' to print all reverse DNS names instead of only the ones matching the base domain
-- @args dns-brute.ipv6 Perform lookup for IPv6 addresses as well. ipv6 can also be se to the value 'only' to only lookup IPv6 records
-- @args dns-brute.srv Perform lookup for SRV records
-- @args dns-brute.domain Domain name to brute force if no host is specified
-- @args newtargets Add discovered targets to nmap scan queue (only applies when dns-brute.domain has been set).
-- If dns-brute.ipv6 is used don't forget to set the -6 Nmap flag, if you require scanning IPv6 hosts.
-- @output
-- Pre-scan script results:
-- | dns-brute:
-- | Result:
-- | DNS Brute-force hostnames:
-- | www.foo.com - 127.0.0.1
-- | mail.foo.com - 127.0.0.2
-- | blog.foo.com - 127.0.1.3
-- | ns1.foo.com - 127.0.0.4
-- | admin.foo.com - 127.0.0.5
-- | Reverse DNS hostnames:
-- | srv-32.foo.com - 127.0.0.16
-- | srv-33.foo.com - 127.0.1.23
-- | C-Classes:
-- | 127.0.0.0/24
-- |_ 127.0.1.0/24
author = "cirrus"
license = "Same as Nmap--See http://nmap.org/book/man-legal.html"
categories = {"intrusive", "discovery"}
prerule = function()
if nmap.registry.args['dns-brute.domain'] then
local name = nmap.registry.args['dns-brute.domain']
if(name:match("^(%d*)%.(%d*)%.(%d*)%.(%d*)$")) then
return false
else
return true
end
else
return false
end
end
hostrule = function(host)
return true
end
require 'dns'
require 'stdnse'
require 'target'
--- Parse a hostname and try to return a domain name
--@param host Hostname to parse
--@return Domain name
function parse_domain(host)
local domainname = ''
if(string.find(host,'%.')) then
remove = string.sub(host,string.find(host,'%.')+1,string.len(host))
else
remove = host
end
if(string.find(remove,'%.')) then
domainname = string.sub(host,string.find(host,'%.')+1,string.len(host))
else
domainname = host
end
return domainname
end
--- Remove the last octet of an IP address
--@param ip IP address to parse
--@return IP address without the last octet
function iptocclass(ip)
local o1, o2, o3, o4 = ip:match("^(%d*)%.(%d*)%.(%d*)%.(%d*)$")
return o1..'.'..o2..'.'..o3
end
--- Check if an element is inside a table
--@param table Table to check
--@param element Element to find in table
--@return boolean Element was found or not
function table.contains(table, element)
if(type(table) == "table") then
for _, value in pairs(table) do
if value == element then
return true
end
end
end
return false
end
--- Try to get the SRV record for a host
--@param host Hostname to resolve
--@result The SRV records or false
resolve_srv = function (host)
local dnsname = host
status, result = dns.query(dnsname, {dtype='SRV',retAll=true})
if(status == true) then
return result
else
return false
end
end
--- Try to get the AAAA record for a host
--@param host Hostname to resolve
--@result The AAAA records or false
resolve_v6 = function (host)
local dnsname = host
status, result = dns.query(dnsname, {dtype='AAAA',retAll=true})
if(status == true) then
return result
else
return false
end
end
--- Try to get the A record for a host
--@param host Hostname to resolve
--@result The A records or false
resolve = function (host)
local dnsname = host
status, result = dns.query(dnsname, {dtype='A',retAll=true})
if(status == true) then
return result
else
return false
end
end
--- Try to get the PTR record for an in-addr.arpa address
--@param host Host to resolve
--@result The PTR records or false
revresolve = function (host)
local ipaddress = dns.reverse(host)
status, result = dns.query(ipaddress, {dtype='PTR',retAll=true})
if(status == true) then
return result
else
return false
end
end
--- Verbose printing function when -v flag is specified
--@param msg The message to print
print_verb = function(msg)
local verbosity, debugging = nmap.verbosity, nmap.debugging
if verbosity() >= 2 or debugging() > 0 then
print(msg)
end
end
thread_main = function( results, ... )
local condvar = nmap.condvar( results )
local what = {n = select("#", ...), ...}
for i = 1, what.n do
if not (ipv6 == 'only') then
local res = resolve(what[i]..'.'..domainname)
if(res) then
for _,addr in ipairs(res) do
local hostn = what[i]..'.'..domainname
if nmap.registry.args['dns-brute.domain'] and target.ALLOW_NEW_TARGETS then
stdnse.print_debug("Added target: "..hostn)
local status,err = target.add(hostn)
end
print_verb("Hostname: "..hostn.." IP: "..addr)
results[#results+1] = { hostname=hostn, address=addr }
end
end
end
if ipv6 then
local res = resolve_v6(what[i]..'.'..domainname)
if(res) then
for _,addr in ipairs(res) do
local hostn = what[i]..'.'..domainname
if nmap.registry.args['dns-brute.domain'] and target.ALLOW_NEW_TARGETS then
stdnse.print_debug("Added target: "..hostn)
local status,err = target.add(hostn)
end
print_verb("Hostname: "..hostn.." IP: "..addr)
results[#results+1] = { hostname=hostn, address=addr }
end
end
end
end
end
srv_main = function( srvresults, ... )
local condvar = nmap.condvar( srvresults )
local what = {n = select("#", ...), ...}
for i = 1, what.n do
local res = resolve_srv(what[i]..'.'..domainname)
if(res) then
for _,addr in ipairs(res) do
local hostn = what[i]..'.'..domainname
addr = stdnse.strsplit(":",addr)
if not (ipv6 == 'only') then
local srvres = resolve(addr[4])
if(srvres) then
for srvhost,srvip in ipairs(srvres) do
print_verb("Hostname: "..hostn.." IP: "..srvip)
srvresults[#srvresults+1] = { hostname=hostn, address=srvip }
if nmap.registry.args['dns-brute.domain'] and target.ALLOW_NEW_TARGETS then
stdnse.print_debug("Added target: "..srvip)
local status,err = target.add(srvip)
end
end
end
end
if ipv6 then
local srvres = resolve_v6(addr[4])
if(srvres) then
for srvhost,srvip in ipairs(srvres) do
print_verb("Hostname: "..hostn.." IP: "..srvip)
srvresults[#srvresults+1] = { hostname=hostn, address=srvip }
if nmap.registry.args['dns-brute.domain'] and target.ALLOW_NEW_TARGETS then
stdnse.print_debug("Added target: "..srvip)
local status,err = target.add(srvip)
end
end
end
end
end
end
end
end
reverse_main = function( revresults, ... )
local condvar = nmap.condvar( revresults )
local what = {n = select("#", ...), ...}
for i = 1, what.n do
local res = revresolve(what[i])
if(res) then
for _,host in ipairs(res) do
if(revcclass == 'printall') then
if(not string.match(host,'addr.arpa$')) then
if nmap.registry.args['dns-brute.domain'] and target.ALLOW_NEW_TARGETS then
stdnse.print_debug("Added target: "..what[i])
local status,err = target.add(what[i])
end
print_verb("Hostname: "..host.." IP: "..what[i])
revresults[#revresults+1] = { hostname=host, address=what[i] }
end
else
if(string.match(host,domainname..'$')) then
if nmap.registry.args['dns-brute.domain'] and target.ALLOW_NEW_TARGETS then
stdnse.print_debug("Added target: "..what[i])
local status,err = target.add(what[i])
end
print_verb("Hostname: "..host.." IP: "..what[i])
revresults[#revresults+1] = { hostname=host, address=what[i] }
end
end
end
end
end
end
action = function(host)
if nmap.registry.args['dns-brute.domain'] then
domainname = nmap.registry.args['dns-brute.domain']
else
domainname = parse_domain(stdnse.get_hostname(host))
end
if not nmap.registry.bruteddomains then
nmap.registry.bruteddomains = {}
end
if(not table.contains(nmap.registry.bruteddomains,domainname)) then
table.insert(nmap.registry.bruteddomains, domainname)
print_verb("Starting dns-brute at: "..domainname)
local max_threads = nmap.registry.args['dns-brute.threads'] and tonumber( nmap.registry.args['dns-brute.threads'] ) or 5
ipv6 = stdnse.get_script_args("dns-brute.ipv6") or false
dosrv = stdnse.get_script_args("dns-brute.srv") or false
if(ipv6 == 'only') then
revcclass = false
else
revcclass = stdnse.get_script_args("dns-brute.cclass") or false
end
stdnse.print_debug("THREADS: "..max_threads)
local fileName = nmap.registry.args['dns-brute.hostlist']
local commFile = fileName and nmap.fetchfile(fileName)
local hostlist
if commFile then
local file = io.open(commFile)
if file then
hostlist = {}
while true do
local l = file:read()
if not l then
break
end
if not l:match("#!comment:") then
table.insert(hostlist, l)
end
end
file:close()
end
else
if fileName then
print("dns-brute: Hostlist file not found. Will use default list.")
end
end
if (not hostlist) then hostlist = {'www', 'mail', 'blog', 'ns0', 'ns1', 'mail2','mail3', 'admin','ads','ssh','voip','sip','dns','ns2','ns3','dns0','dns1','dns2','eshop','shop','forum','ftp', 'ftp0', 'host','log', 'mx0', 'mx1', 'mysql', 'sql', 'news', 'noc', 'ns', 'auth', 'administration', 'adserver', 'alerts', 'alpha', 'ap', 'app', 'apache', 'apps' ,'appserver', 'gw', 'backup', 'beta', 'cdn', 'chat', 'citrix', 'cms', 'erp', 'corp', 'intranet', 'crs', 'svn', 'cvs', 'git', 'db', 'database', 'demo', 'dev', 'devsql', 'dhcp', 'dmz', 'download', 'en', 'f5', 'fileserver', 'firewall', 'help', 'http', 'id', 'info', 'images', 'internal', 'internet', 'lab', 'ldap', 'linux', 'local', 'log', 'ipv6', 'syslog', 'mailgate', 'main', 'manage', 'mgmt', 'monitor', 'mirror', 'mobile', 'mssql', 'oracle', 'exchange', 'owa', 'mta', 'mx', 'mx0', 'mx1', 'ntp', 'ops', 'pbx', 'whois', 'ssl', 'secure', 'server', 'smtp', 'squid', 'stage', 'stats', 'test', 'upload', 'vm', 'vnc', 'vpn', 'wiki', 'xml'} end
local srvlist = {'_afpovertcp._tcp','_ssh._tcp','_autodiscover._tcp','_caldav._tcp','_client._smtp','_gc._tcp','_h323cs._tcp','_h323cs._udp','_h323ls._tcp','_h323ls._udp','_h323rs._tcp','_h323rs._tcp','_http._tcp','_iax.udp','_imap._tcp','_imaps._tcp','_jabber-client._tcp','_jabber._tcp','_kerberos-adm._tcp','_kerberos._tcp','_kerberos._tcp.dc._msdcs','_kerberos._udp','_kpasswd._tcp','_kpasswd._udp','_ldap._tcp','_ldap._tcp.dc._msdcs','_ldap._tcp.gc._msdcs','_ldap._tcp.pdc._msdcs','_msdcs','_mysqlsrv._tcp','_ntp._udp','_pop3._tcp','_pop3s._tcp','_sip._tcp','_sip._tls','_sip._udp','_sipfederationtls._tcp','_sipinternaltls._tcp','_sips._tcp','_smtp._tcp','_stun._tcp','_stun._udp','_tcp','_tls','_udp','_vlmcs._tcp','_vlmcs._udp','_wpad._tcp','_xmpp-client._tcp','_xmpp-server._tcp'}
local threads, results, revresults, srvresults = {}, {}, {}, {}
results['name'] = "Result:"
local condvar = nmap.condvar( results )
local i = 1
local howmany = math.floor(#hostlist/max_threads)+1
if (howmany > 7900) then
--Cannot unpack a list with more than 7900 items so we will set it to 7900
stdnse.print_debug("Hostlist items per thread is more than 7900. Setting to 7900.")
howmany = 7900
end
stdnse.print_debug("Hosts per thread: "..howmany)
repeat
local j = math.min(i+howmany, #hostlist)
threads[stdnse.new_thread( thread_main,results, unpack(hostlist, i, j) )] = true
i = j+1
until i > #hostlist
local done
-- wait for all threads to finish
while( not(done) ) do
condvar("wait")
done = true
for thread in pairs(threads) do
if (coroutine.status(thread) ~= "dead") then done = false end
end
end
if(dosrv) then
local i = 1
local threads = {}
local howmany_ip = math.floor(#srvlist/max_threads)+1
local condvar = nmap.condvar( srvresults )
stdnse.print_debug("SRV's per thread: "..howmany_ip)
repeat
local j = math.min(i+howmany_ip, #srvlist)
threads[stdnse.new_thread( srv_main,srvresults, unpack(srvlist, i, j) )] = true
i = j+1
until i > #srvlist
local done
-- wait for all threads to finish
while( not(done) ) do
condvar("wait")
done = true
for thread in pairs(threads) do
if (coroutine.status(thread) ~= "dead") then done = false end
end
end
end
if (revcclass and not (ipv6=='only')) then
cclasses = {}
ipaddresses = {}
local i = 1
for _, res in ipairs(results) do
if res['address']:match(":") then
print_verb("IPv6 class detected skipping: "..res['address'])
else
local class = iptocclass(res['address'])
if(not table.contains(cclasses,class)) then
print_verb("C-Class: "..class..".0/24")
table.insert(cclasses,class)
end
end
end
if(dosrv) then
for _, res in ipairs(srvresults) do
if res['address']:match(":") then
print_verb("IPv6 class detected skipping: "..res['address'])
else
local class = iptocclass(res['address'])
if(not table.contains(cclasses,class)) then
print_verb("C-Class: "..class..".0/24")
table.insert(cclasses,class)
end
end
end
end
for _,class in ipairs(cclasses) do
for v=1,254,1 do
table.insert(ipaddresses, class..'.'..v)
end
end
stdnse.print_debug("Will reverse lookup "..#ipaddresses.." IPs")
print_verb("Starting reverse DNS in c-classes")
local threads = {}
local howmany_ip = math.floor(#ipaddresses/max_threads)+1
local condvar = nmap.condvar( revresults )
stdnse.print_debug("IP's per thread: "..howmany_ip)
repeat
local j = math.min(i+howmany_ip, #ipaddresses)
threads[stdnse.new_thread( reverse_main,revresults, unpack(ipaddresses, i, j) )] = true
i = j+1
until i > #ipaddresses
local done
-- wait for all threads to finish
while( not(done) ) do
condvar("wait")
done = true
for thread in pairs(threads) do
if (coroutine.status(thread) ~= "dead") then done = false end
end
end
end
response = {}
response['name'] = "Result:"
table.insert(response,"DNS Brute-force hostnames:")
if(#results==0) then
table.insert(response,"No results.")
end
for _, res in ipairs(results) do
table.insert(response, res['hostname'].." - "..res['address'])
end
if(dosrv) then
table.insert(response,"SRV results:")
if(#srvresults==0) then
table.insert(response,"No results.")
end
for _, res in ipairs(srvresults) do
table.insert(response, res['hostname'].." - "..res['address'])
end
end
if revcclass then
table.insert(response,"Reverse DNS hostnames:")
if(#revresults==0) then
table.insert(response,"No results.")
end
for _, res in ipairs(revresults) do
table.insert(response, res['hostname'].." - "..res['address'])
end
if(#cclasses>0) then
table.insert(response,"C-Classes:")
for _, res in ipairs(cclasses) do
table.insert(response, res..".0/24")
end
end
end
return stdnse.format_output(true, response)
end
end

View File

@@ -23,6 +23,7 @@ Entry { filename = "daytime.nse", categories = { "discovery", "safe", } }
Entry { filename = "db2-das-info.nse", categories = { "discovery", "safe", "version", } }
Entry { filename = "db2-discover.nse", categories = { "broadcast", "safe", } }
Entry { filename = "dhcp-discover.nse", categories = { "default", "discovery", "intrusive", } }
Entry { filename = "dns-brute.nse", categories = { "discovery", "intrusive", } }
Entry { filename = "dns-cache-snoop.nse", categories = { "discovery", "intrusive", } }
Entry { filename = "dns-fuzz.nse", categories = { "fuzzer", "intrusive", } }
Entry { filename = "dns-random-srcport.nse", categories = { "external", "intrusive", } }